Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 00:24
Static task
static1
Behavioral task
behavioral1
Sample
15753c6f48f7ef7d39e4d56e58f2bca8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
15753c6f48f7ef7d39e4d56e58f2bca8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
15753c6f48f7ef7d39e4d56e58f2bca8_JaffaCakes118.html
-
Size
23KB
-
MD5
15753c6f48f7ef7d39e4d56e58f2bca8
-
SHA1
bbfe11dd49f15aaceeeacf389e38444f4c20ea69
-
SHA256
9e7d570f45b19ea589261b0244d5bb0313ba6a7cc646f9594528fc2f3d907891
-
SHA512
30a7291029579d48602f5c301e9eedf6676dd365e74a3cc9ad4a4f2e5f1135cb741074be40f26ab369ec375ed6d7a2ed69722ee12e79419416f4d18e60b93343
-
SSDEEP
192:uWjYb5nDynQjxn5Q/ynQiepNn2TYfnQOkEntWYnQTbntnQ/CnQt1wMBJqnYnQ7tz:aQ/cTYjXKEQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434249727" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{296DF631-82B0-11EF-9E0F-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806b9bffbc16db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051e3bc6da93b8b468b6805ade5b3e190000000000200000000001066000000010000200000000277068523586201d96adc9cc798dad0fd4f98b5ac9dfc24806b7bf25521c608000000000e80000000020000200000002abf7e324ebbe5218a889125ab55626a4f331dd9b5d69efef59f0e804f892b6520000000c8e616e65c22ec483b4d2e02ebe80e95e5d0de254b1c34fa02065b6c3f7a5e9a400000003bd4a7f3478eec426d1dd04b2fb3bcaa7f8c8e3a2712c4775f7fd90ae1f8dfa5c0d97d69a6b553f4a3854657810e2a77b19a48c10d817d2ef8182348d47e6a96 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2300 2520 iexplore.exe 30 PID 2520 wrote to memory of 2300 2520 iexplore.exe 30 PID 2520 wrote to memory of 2300 2520 iexplore.exe 30 PID 2520 wrote to memory of 2300 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15753c6f48f7ef7d39e4d56e58f2bca8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff54a09704665cc41b083b82411d3f0
SHA1bbddf7cae2e180abcbf7476bf6cb640dcd631110
SHA256e187b5f1eebb7eb8f8e75d56de14aa47f14bb54f57a724d7c4c483c7d5de0c89
SHA512b88cb8387eff40c5994881b5198514fe83692f9990c3b31d1c6954af191e3c9a92ce0df873ef36b685938146f15e3a3d0bb457261517bfa264be73df9d2cc71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526070cd03820ecbe3dd51a5289cf2865
SHA1be4ace78343797101e4b9fccd287546ec6b132b2
SHA256d3adcc0344af5368692c4de215e575686294b791310945d359fe4b8bcb8cceaf
SHA512aed04efcebce674e1c05f371c25b1dae289420e0b8f8abfd024f64c3403b494a012087547fbc88f25151870363a74f0f20cb3b881caf0c778136f0402e78a93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb23f16d289ba5c81af27225af590fa8
SHA146f157bedece38ed7760c62071a38c9eab6cd5e9
SHA256d50447a20f286aa5aa3cab9e791f0027895693e9e5e2d69326069f694a5f31f5
SHA5129f0bd981b0f348e092c9eee6747ebf63f4dd7641d4a76e6f73db399265c629030199a38ba3cf7a1c6c55dcfa811ae6b7db531076bf6a05edbbab4febcde0466d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde9bd40b7b912a963a71c37313b7de1
SHA1759f8f3bc0c0b0eb8e4a567a9a7eff3bb4cc8e74
SHA256cf77e441a3c661e6717dacdf83221d0efeeef4c355ca8bf6e4baf48310f8adb7
SHA512653f5cd4ebcb774e20508db350b60870777a7d3dce3940c9773daf744813d96148c485286620c6b236af93f9b60aa1f2731b47fc618227e37c0fbc9abe9aa6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b81ae613c30e5d669306dd7516ae9f0
SHA15ebae0fd39ce31ece644af092631e9e422422bd0
SHA256b2afa0888f0c5e322043e30d7f7cfee76ef3b58b992841d4a0cee0afe8c240ac
SHA512107466593cffae785e39f61944c8b6f29741a72409676fca9837e4f52b88c97807bb595d14e921fb344bf7da087105625a1cdce62bf0d959aa8df23e94cade38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517cef8501604f1852ba8caad7921a8cd
SHA1c10262a35476e8547f939e559a13955cd1d3c176
SHA256794ed4fc47e98cdbdcef910c30f3e440a3afbb26b5730b108d03c4af84daa433
SHA5122b5166cd422d86ca07658daa0d9c650867f9746f573054019542b1a5edb505deb28f7df3b81001a532b397b82337e53058cb50ffcb275f8f4974a28acd4b028a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bda4293a124a5e0ee2aadd6b8386752
SHA1d988cae75b02d388385a22202c5ecb341246de0a
SHA256e7fb5a6ec48ca4d687c3230b079e2329fcbc7ace3bed8fd621f1cd5945425fdc
SHA512f9f85b4c67e7d01f5634d9b0afda1994893d144304bc7c4ccc81109a700cb2113b4b0eabfdb79d51a46f08900e281f3708fda982edd2b6c9b119bfb393f04720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56442d1beb4d62cc12cdc33459b9d3d8e
SHA1c9702077c1735e25c29fed9dd3883a8e803bef7a
SHA256d9a3730c0d943b54e3ea4202c101b7fe15ebf44a9b447e8c6c5751e56a1869fc
SHA512f4c72a2da0749bef106c0524d55270d7d0ffeac7b9e419eee31e78a8eb9e2e64f488a558dff5c7134bb320579460348f2266a68e8f8eba0e31f8001a2e2b6510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c912d1678d9b9c4ad2ad5bfff244f7e
SHA1743b905a15a3d1eaeb8d334ac556768a9e137315
SHA256a7c59694e6439413c6c3425f3661169d9ba31f20624e4a19018dd02ac37588b1
SHA51210bfc99678acfc6a1b5d92e74e5c86f1c50e1ac5c0245f67cc6d8ca977a54a33f47a31964f549322418510cd1b70ebe6317adc635b217db30d54dba80519bbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f223f6cfd01a8e5f8a79a7ba5f1c47
SHA1bd65dd2adf15caa2dbc190ae5c15eafb1f3a3e28
SHA256c01bb53682ecf5dce34c01b432d04d267b9fc82f414c2ac9f3ea22a659ed9b51
SHA512e04c90278b7822c6b1d8c1236ff7eff8466a3dda49182d6be4a162a64c326fec5f01253c83cb4c6c3068a7ab31f83b98bb9c0ae2f44e6b5fc623ef8531504105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebd382516ddabd9033f3d4fd7cf03da
SHA14e29e3a2d5d00cf38a0a3c32b47957b6a00ef627
SHA256c6d19357da99fffc389ccf020ebc9abc8fd7c59b464c749d0f74faa4237b8338
SHA512e20057c4cccfa940955c01cac52f5269cd57b4f30f73f378c786ef542198ba12d554891724a6a38428556c86702c8bb7db22fcf8bb82940c9884fd1aa19cfc84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3da04845bc210404fe22b8816941b03
SHA19118ced2ac007ba7e3919411aeb396cf6c56c475
SHA256c164afd93136b98c5ef4979589f42891e22cb91d0976d4c3ecd694f67cbfd0a0
SHA512f69a8600ff8b2502e403663168cd36fb0baccc9cf97d1774b3fb85d74d6dd3457d222157606a19d29ed0347efebd93bcb588335b41084c95155fb62f041707d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c1cd32772c370eff95c45267efbb56
SHA1a6edc50589923def7c1a737e092085aefd1e7714
SHA256dd9b02878ffbd94ab4e550c06e4af81df3d4b7da0bdcab402647d4aca3581161
SHA5126691f74d58ecdae805b4ed9b9cce52c72b30f916e3f4a1e292888a6e7f1da586182fc4d86a5337f3a72f7e910288dc1f0b8378d383a67c34b041306f97907354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514285be8e975ad2625d3492982afd9ac
SHA1e816ad4c43e2c57b5c0b22628b72a59320a15b68
SHA25666f6f1076c5abeb59513fe9316a829bdd8084f0cfc463c59e439966f77a2353e
SHA5127c5c069739752dbdadaf6bb2408a76ec69126af0bc2b7c05f7652cddc6b7ef187b1ca8eb86605e30ef36906e00de80a2a04d7b971d91421f300770aa31d23032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c7c2b0aa109bf18d8f4bc97e2b8b02
SHA190f8a06cb90386f3e00a708222f1f0361c228329
SHA25667002819b2df785f50ab19f3aedd1d621b2cceb2035d2e5503636cc0167fb8c9
SHA5127ffdf6f1f3532aa41be9f6c374610f56551d6ecd7fd103f20698d552d1650d74cf01f9830eb16e10f1daaa25f7b60f7db7335c9065ade00db336b2222953ea2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047d0268824980c4b065f1897c45f2e3
SHA161421c804a392ed06f15cf51d3233d7ca21a4784
SHA2567a6874360785549f315c91eab457ecfeaeb69ae483ebe38db254f91c4107a2fa
SHA51207d6819dab7ac33f56fe90445e04153a189854106930a55cf19ea517b28d0ffc069e3b9ab315d5fbf255e00cd87627ba5f91513b5f4cf6ff3b40eb848d7ed4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbdd4765214504d2668c49f69e7cade0
SHA17f6924bc184f3d6909787ab44289f5b89aa5a9d4
SHA2567c6ba7504cbff5e967d1a00ab582ce4b460a94d3e80bbf2f1798a5b75ba49151
SHA5122e09adf395487b359819b70833f20fbae0e7e59195ed6fe3997b6159a2b0d99f833f9b12a62259bc1c2441342d79c8afdee30bed49613f61510c5e670f69f224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f927b80d2621193e78e105c794e9bf5c
SHA1f86e6acd8ffb421b68cb29bee3f05cf64523d66c
SHA2568ac0c35943bd70f12fabad6bb8b5160561c7cd500b9df05913e8f569c4a1b463
SHA512a91621e10fd621d40e79f48548b9b4a395160b032c94fe940390390cc3f37a7b6b936e928efc382c664db447d47b833c5675ac9aa0b8ac7d1aeec9c90599be36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537519a2955ef3c7b24b38a807762304e
SHA1f75749d1e4fe644b78abd172cef3871ab27e476f
SHA256fc84ecef036139c89f38da08de95240fd9322524dfcf154e1e4dc7b8021dcd27
SHA5125ef276e459e635a4a4235bdbc1692d5da323324381c791de00aeb3f2ec02bf9852f5de684e75d09ebcd6d884c1d4a40efab203638ebf7cf899c9ae0bb47d78b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b